capa detects capabilities in executable files. You run it against a PE, ELF, .NET module, shellcode file, or a sandbox report and it tells you what it thinks the program can do. For example, it might suggest that the file is a backdoor, is capable of installing services, or relies on HTTP to communicate.
To interactively inspect capa results in your browser use the capa Explorer Web.
If you want to inspect or write capa rules, head on over to the capa-rules repository. Otherwise, keep reading.
Below you find a list of our capa blog posts with more details.
$ capa.exe suspicious.exe
+------------------------+--------------------------------------------------------------------------------+
| ATT&CK Tactic | ATT&CK Technique |
|------------------------+--------------------------------------------------------------------------------|
| DEFENSE EVASION | Obfuscated Files or Information [T1027] |
| DISCOVERY | Query Registry [T1012] |
| | System Information Discovery [T1082] |
| EXECUTION | Command and Scripting Interpreter::Windows Command Shell [T1059.003] |
| | Shared Modules [T1129] |
| EXFILTRATION | Exfiltration Over C2 Channel [T1041] |
| PERSISTENCE | Create or Modify System Process::Windows Service [T1543.003] |
+------------------------+--------------------------------------------------------------------------------+
+-------------------------------------------------------+-------------------------------------------------+
| CAPABILITY | NAMESPACE |
|-------------------------------------------------------+-------------------------------------------------|
| check for OutputDebugString error | anti-analysis/anti-debugging/debugger-detection |
| read and send data from client to server | c2/file-transfer |
| execute shell command and capture output | c2/shell |
| receive data (2 matches) | communication |
| send data (6 matches) | communication |
| connect to HTTP server (3 matches) | communication/http/client |
| send HTTP request (3 matches) | communication/http/client |
| create pipe | communication/named-pipe/create |
| get socket status (2 matches) | communication/socket |
| receive data on socket (2 matches) | communication/socket/receive |
| send data on socket (3 matches) | communication/socket/send |
| connect TCP socket | communication/socket/tcp |
| encode data using Base64 | data-manipulation/encoding/base64 |
| encode data using XOR (6 matches) | data-manipulation/encoding/xor |
| run as a service | executable/pe |
| get common file path (3 matches) | host-interaction/file-system |
| read file | host-interaction/file-system/read |
| write file (2 matches) | host-interaction/file-system/write |
| print debug messages (2 matches) | host-interaction/log/debug/write-event |
| resolve DNS | host-interaction/network/dns/resolve |
| get hostname | host-interaction/os/hostname |
| create a process with modified I/O handles and window | host-interaction/process/create |
| create process | host-interaction/process/create |
| create registry key | host-interaction/registry/create |
| create service | host-interaction/service/create |
| create thread | host-interaction/thread/create |
| persist via Windows service | persistence/service |
+-------------------------------------------------------+-------------------------------------------------+
Download stable releases of the standalone capa binaries here. You can run the standalone binaries without installation. capa is a command line tool that should be run from the terminal.
To use capa as a library or integrate with another tool, see doc/installation.md for further setup instructions.
The capa Explorer Web enables you to interactively explore capa results in your web browser. Besides the online version you can download a standalone HTML file for local offline usage.
More details on the web UI is available in the capa Explorer Web README.
In the above sample output, we run capa against an unknown binary (suspicious.exe
),
and the tool reports that the program can send HTTP requests, decode data via XOR and Base64,
install services, and spawn new processes.
Taken together, this makes us think that suspicious.exe
could be a persistent backdoor.
Therefore, our next analysis step might be to run suspicious.exe
in a sandbox and try to recover the command and control server.
By passing the -vv
flag (for very verbose), capa reports exactly where it found evidence of these capabilities.
This is useful for at least two reasons:
- it helps explain why we should trust the results, and enables us to verify the conclusions, and
- it shows where within the binary an experienced analyst might study with IDA Pro
$ capa.exe suspicious.exe -vv
...
execute shell command and capture output
namespace c2/shell
author matthew.williams@mandiant.com
scope function
att&ck Execution::Command and Scripting Interpreter::Windows Command Shell [T1059.003]
references https://docs.microsoft.com/en-us/windows/win32/api/processthreadsapi/ns-processthreadsapi-startupinfoa
function @ 0x4011C0
and:
match: create a process with modified I/O handles and window @ 0x4011C0
and:
number: 257 = STARTF_USESTDHANDLES | STARTF_USESHOWWINDOW @ 0x4012B8
or:
number: 68 = StartupInfo.cb (size) @ 0x401282
or: = API functions that accept a pointer to a STARTUPINFO structure
api: kernel32.CreateProcess @ 0x401343
match: create pipe @ 0x4011C0
or:
api: kernel32.CreatePipe @ 0x40126F, 0x401280
optional:
match: create thread @ 0x40136A, 0x4013BA
or:
and:
os: windows
or:
api: kernel32.CreateThread @ 0x4013D7
or:
and:
os: windows
or:
api: kernel32.CreateThread @ 0x401395
or:
string: "cmd.exe" @ 0x4012FD
...
capa also supports dynamic capabilities detection for multiple sandboxes including:
- CAPE (supported report formats:
.json
,.json_
,.json.gz
) - DRAKVUF (supported report formats:
.log
,.log.gz
) - VMRay (supported report formats: analysis archive
.zip
)
To use this feature, submit your file to a supported sandbox and then download and run capa against the generated report file. This feature enables capa to match capabilities against dynamic and static features that the sandbox captured during execution.
Here's an example of running capa against a packed file, and then running capa against the CAPE report generated for the same packed file:
$ capa 05be49819139a3fdcdbddbdefd298398779521f3d68daa25275cc77508e42310.exe
WARNING:capa.capabilities.common:--------------------------------------------------------------------------------
WARNING:capa.capabilities.common: This sample appears to be packed.
WARNING:capa.capabilities.common:
WARNING:capa.capabilities.common: Packed samples have often been obfuscated to hide their logic.
WARNING:capa.capabilities.common: capa cannot handle obfuscation well using static analysis. This means the results may be misleading or incomplete.
WARNING:capa.capabilities.common: If possible, you should try to unpack this input file before analyzing it with capa.
WARNING:capa.capabilities.common: Alternatively, run the sample in a supported sandbox and invoke capa against the report to obtain dynamic analysis results.
WARNING:capa.capabilities.common:
WARNING:capa.capabilities.common: Identified via rule: (internal) packer file limitation
WARNING:capa.capabilities.common:
WARNING:capa.capabilities.common: Use -v or -vv if you really want to see the capabilities identified by capa.
WARNING:capa.capabilities.common:--------------------------------------------------------------------------------
$ capa 05be49819139a3fdcdbddbdefd298398779521f3d68daa25275cc77508e42310.json
ββββββββββββββββββββββββββ―βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β ATT&CK Tactic β ATT&CK Technique β
ββββββββββββββββββββββββββΏβββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ₯
β CREDENTIAL ACCESS β Credentials from Password Stores T1555 β
ββββββββββββββββββββββββββΌβββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β DEFENSE EVASION β File and Directory Permissions Modification T1222 β
β β Modify Registry T1112 β
β β Obfuscated Files or Information T1027 β
β β Virtualization/Sandbox Evasion::User Activity Based Checks T1497.002 β
ββββββββββββββββββββββββββΌβββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β DISCOVERY β Account Discovery T1087 β
β β Application Window Discovery T1010 β
β β File and Directory Discovery T1083 β
β β Query Registry T1012 β
β β System Information Discovery T1082 β
β β System Location Discovery::System Language Discovery T1614.001 β
β β System Owner/User Discovery T1033 β
ββββββββββββββββββββββββββΌβββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β EXECUTION β System Services::Service Execution T1569.002 β
ββββββββββββββββββββββββββΌβββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β PERSISTENCE β Boot or Logon Autostart Execution::Registry Run Keys / Startup Folder T1547.001 β
β β Boot or Logon Autostart Execution::Winlogon Helper DLL T1547.004 β
β β Create or Modify System Process::Windows Service T1543.003 β
ββββββββββββββββββββββββββ·βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββ―βββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β Capability β Namespace β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββΏβββββββββββββββββββββββββββββββββββββββββββββββββββββββ₯
β check for unmoving mouse cursor (3 matches) β anti-analysis/anti-vm/vm-detection β
β gather bitkinex information β collection/file-managers β
β gather classicftp information β collection/file-managers β
β gather filezilla information β collection/file-managers β
β gather total-commander information β collection/file-managers β
β gather ultrafxp information β collection/file-managers β
β resolve DNS (23 matches) β communication/dns β
β initialize Winsock library (7 matches) β communication/socket β
β act as TCP client (3 matches) β communication/tcp/client β
β create new key via CryptAcquireContext β data-manipulation/encryption β
β encrypt or decrypt via WinCrypt β data-manipulation/encryption β
β hash data via WinCrypt β data-manipulation/hashing β
β initialize hashing via WinCrypt β data-manipulation/hashing β
β hash data with MD5 β data-manipulation/hashing/md5 β
β generate random numbers via WinAPI β data-manipulation/prng β
β extract resource via kernel32 functions (2 matches) β executable/resource β
β interact with driver via control codes (2 matches) β host-interaction/driver β
β get Program Files directory (18 matches) β host-interaction/file-system β
β get common file path (575 matches) β host-interaction/file-system β
β create directory (2 matches) β host-interaction/file-system/create β
β delete file β host-interaction/file-system/delete β
β get file attributes (122 matches) β host-interaction/file-system/meta β
β set file attributes (8 matches) β host-interaction/file-system/meta β
β move file β host-interaction/file-system/move β
β find taskbar (3 matches) β host-interaction/gui/taskbar/find β
β get keyboard layout (12 matches) β host-interaction/hardware/keyboard β
β get disk size β host-interaction/hardware/storage β
β get hostname (4 matches) β host-interaction/os/hostname β
β allocate or change RWX memory (3 matches) β host-interaction/process/inject β
β query or enumerate registry key (3 matches) β host-interaction/registry β
β query or enumerate registry value (8 matches) β host-interaction/registry β
β delete registry key β host-interaction/registry/delete β
β start service β host-interaction/service/start β
β get session user name β host-interaction/session β
β persist via Run registry key β persistence/registry/run β
β persist via Winlogon Helper DLL registry key β persistence/registry/winlogon-helper β
β persist via Windows service (2 matches) β persistence/service β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββ·βββββββββββββββββββββββββββββββββββββββββββββββββββββββ
capa uses a collection of rules to identify capabilities within a program. These rules are easy to write, even for those new to reverse engineering. By authoring rules, you can extend the capabilities that capa recognizes. In some regards, capa rules are a mixture of the OpenIOC, Yara, and YAML formats.
Here's an example rule used by capa:
rule:
meta:
name: create TCP socket
namespace: communication/socket/tcp
authors:
- william.ballenthin@mandiant.com
- joakim@intezer.com
- anushka.virgaonkar@mandiant.com
scopes:
static: basic block
dynamic: call
mbc:
- Communication::Socket Communication::Create TCP Socket [C0001.011]
examples:
- Practical Malware Analysis Lab 01-01.dll_:0x10001010
features:
- or:
- and:
- number: 6 = IPPROTO_TCP
- number: 1 = SOCK_STREAM
- number: 2 = AF_INET
- or:
- api: ws2_32.socket
- api: ws2_32.WSASocket
- api: socket
- property/read: System.Net.Sockets.TcpClient::Client
The github.com/mandiant/capa-rules repository contains hundreds of standard rules that are distributed with capa. Please learn to write rules and contribute new entries as you find interesting techniques in malware.
If you use IDA Pro, then you can use the capa explorer plugin. capa explorer helps you identify interesting areas of a program and build new capa rules using features extracted directly from your IDA Pro database. It also uses your local changes to the .idb to extract better features, such as when you rename a global variable that contains a dynamically resolved API address.
If you use Ghidra, then you can use the capa + Ghidra integration to run capa's analysis directly on your Ghidra database and render the results in Ghidra's user interface.
- Dynamic capa: Exploring Executable Run-Time Behavior with the CAPE Sandbox
- capa v4: casting a wider .NET (.NET support)
- ELFant in the Room β capa v3 (ELF support)
- capa 2.0: Better, Stronger, Faster
- capa: Automatically Identify Malware Capabilities
The capa-testfiles repository contains the data we use to test capa's code and rules